Functional morphology of the pharyngeal teeth of the ocean sunfish, Mola mola
Abstract Many fish use a set of pharyngeal jaws in their throat to aid in prey capture and processing, particularly of large or complex prey. In this study—combining dissection, CT scanning, histology, and performance testing—we demonstrate a novel use of pharyngeal teeth in the ocean sunfish (Mola mola), a species for which pharyngeal jaw anatomy had ...
Benjamin Flaum+3 more
wiley +1 more source
Comprehensive Review and Analysis of Cryptography Techniques in Cloud Computing
Cloud computing is a fast-growing industry that offers various online services, including software, computing resources, and databases. Its payment model is usage-based, whereas consistency is based on resource-sharing.
K. Sasikumar, Sivakumar Nagarajan
doaj +1 more source
FPGA Implementation for Elliptic Curve Cryptography Algorithm and Circuit with High Efficiency and Low Delay for IoT Applications. [PDF]
Wang D, Lin Y, Hu J, Zhang C, Zhong Q.
europepmc +1 more source
Use of Elliptic Curves in Cryptography [PDF]
We discuss the use of elliptic curves in cryptography. In particular, we propose an analogue of the Diffie-Hellmann key exchange protocol which appears to be immune from attacks of the style of Western, Miller, and Adleman. With the current bounds for infeasible attack, it appears to be about 20% faster than the Diffie-Hellmann scheme over GF(p).
openaire +1 more source
Predicting ecology and hearing sensitivities in Parapontoporia—An extinct long‐snouted dolphin
Abstract Analyses of the cetacean (whale and dolphin) inner ear provide glimpses into the ecology and evolution of extinct and extant groups. The paleoecology of the long‐snouted odontocete (toothed whale) group, Parapontoporia, is primarily marine with its depositional context also suggesting freshwater tolerance.
Joyce Sanks, Rachel Racicot
wiley +1 more source
Practical Three-Factor Authentication Protocol Based on Elliptic Curve Cryptography for Industrial Internet of Things. [PDF]
Zhao X, Li D, Li H.
europepmc +1 more source
Workload characterization of elliptic curve cryptography and other network security algorithms for constrained environments [PDF]
Murat Fiskiran, Lee
openalex +1 more source
New digital signature protocol based on elliptic curves [PDF]
In this work, a new digital signature based on elliptic curves is presented. We established its efficiency and security. The method, derived from a variant of ElGamal signature scheme, can be seen as a secure alternative protocol if known systems are completely broken.
arxiv
Abstract The trigeminus nerve (cranial nerve V) is a large and significant conduit of sensory information from the face to the brain, with its three branches extending over the head to innervate a wide variety of integumentary sensory receptors, primarily tactile.
Juri A. Miyamae+4 more
wiley +1 more source
Cohomology of moduli spaces of Del Pezzo surfaces
Abstract We compute the rational Betti cohomology groups of the coarse moduli spaces of geometrically marked Del Pezzo surfaces of degree 3 and 4 as representations of the Weyl groups of the corresponding root systems. The proof uses a blend of methods from point counting over finite fields and techniques from arrangement complements.
Olof Bergvall, Frank Gounelas
wiley +1 more source